Would you make the crucial decisions needed after a ransomware attack to save your organisation’s operations and reputation? Play along in this simulation to find out how you would fare as a key member of the Incident Response team. Will you pay the ransom? There’s only one way to find out…
Recorded on: Monday 20th September 2021
REvil Kaseya ransomware attack: What you need to know
Last weekend, the REvil ransomare gang exploited a vulnerability in Kaseya VSA, effectively distributing ransomware downstream to hundreds of organisations. Join us to learn how the group was able to execute this supply chain attack and how to find out if you are at risk. We’ll also give you practical mitigation and recovery steps.
Recorded on: Friday 16th July 2021
Hacking the golf course
Organisations often forget that physical and cyber security are linked. Jake is used to hacking up the golf course with his 8 iron, but join us to hear how he recently used his other hacking skills to pen-test a golf club. The results are mind-blowing and even comical!
Recorded on: Thursday 15th July 2021
Do video games really breed hackers?
We explore how the online wild west of gaming seemingly escalates young gamers from simple cheat codes to full-scale DDoS attacks and state-sponsored espionage. Join us to discuss whether cheating at a video game encourages young people to become hackers, or if hackers just happen to like playing video games…
Recorded on: Monday 5th July 2021
How to hack a human: How social media drives social engineering
Hackers hack humans to hack the companies they work for. With social media, OOO messages, and a never-ending stream of news, the information bad actors need to carry out effective social engineering attacks is at their fingertips. Learn what makes people – and companies – most vulnerable, and what you can do to protect yourself.
Recorded on: Tuesday 16th March 2021
How to hijack your boss' email account remotely
What would you do if you could access your boss’ email account? Give yourself a pay rise? Jake recently worked out a method that Apple, Microsoft and Google have since acknowledged. Anyone can recreate it, across any of multiple platforms. Join us as we learn how this new finding operates and how you can protect yourself and your organisation from this attack.
With the shift in the remote workforce, there’s been an increase in adversaries using a man-in-the-middle attack to bypass MFA and breach Office 365 tenants. Join us as you will get to see how this attack is executed, as the attacker gains access to SharePoint online and accesses sensitive organisational files. We'll show you how you can detect and respond.
Recorded on: Friday 13th November 2020
How to hack a police station
Watch Jake unfold a targeted physical and cyberattack on a police station whilst equipped with a genuine “get out of jail free” card. Find out how he was able to bypass physical security and procedures in place in order to get into the network and control all aspects of the police database – even change passwords.
Recorded on: Wednesday 11th November 2020
Online Fraud Online
The nationwide lockdown has pushed more fraudsters into the digital world. Mark is one of SASIG's most popular speakers and will give you the knowledge you need to protect yourself, your family and your organisation. He demonstrates how criminals find and fool their victims, discover personal data and socially engineer victims, and find vulnerable devices to spread malware.
Recorded on: Wednesday 15th April 2020
HackedIn Via LinkedIn
Find out how Jake phished a CEO of a company via LinkedIn and was able to manipulate the CEO to giving him his passwords and other security info.